Reference document

Title
JISR Exploitation Applications
Description

The Joint Intelligence, Surveillance and Reconnaissance (JISR) Exploitation Applications enable users to review, annotate, tag, categorize, transform, and manipulate ISR data in order to extract useful and valid intelligence out of the received data and generate relevant reports for dissemination.

Level
6
emUUID
5d0df115-54b5-40a8-a2ef-7ab911769ded
Parent
JISR Processing Applications